import base64
import errno
import os
import passfd
import signal
import socket
import time
import tunchannel
from optparse import OptionParser
IFF_TAP = 0x0002
# Trak SIGTERM, and set global termination flag instead of dying
TERMINATE = []
STARTED = False
def _finalize(sig,frame):
global TERMINATE
global STARTED
if STARTED:
TERMINATE.append(None)
else:
signal.signal(signal.SIGTERM, signal.SIG_DFL)
os.kill(os.getpid(), signal.SIGTERM)
signal.signal(signal.SIGTERM, _finalize)
# SIGUSR1 suspends forwading, SIGUSR2 resumes forwarding
SUSPEND = []
def _suspend(sig,frame):
global SUSPEND
if not SUSPEND:
SUSPEND.append(None)
signal.signal(signal.SIGUSR1, _suspend)
def _resume(sig,frame):
global SUSPEND
if SUSPEND:
SUSPEND.remove(None)
signal.signal(signal.SIGUSR2, _resume)
def get_options():
usage = ("usage: %prog -a
-b -c "
"- k -q -p "
"-P -o -O "
"-r ")
parser = OptionParser(usage = usage)
parser.add_option("-a", "--address", dest="address",
help="Socket address to send file descriptor to", type="str")
parser.add_option("-b", "--bwlimit", dest="bwlimit",
help="Specifies the interface's emulated bandwidth in bytes ",
default=None, type="int")
parser.add_option("-q", "--txqueuelen", dest="txqueuelen",
help="Specifies the interface's transmission queue length. ",
default=1000, type="int")
parser.add_option("-c", "--cipher", dest="cipher",
help="Cipher to encript communication. "
"One of PLAIN, AES, Blowfish, DES, DES3. ",
default=None, type="str")
parser.add_option("-k", "--cipher-key", dest="cipher_key",
help="Specify a symmetric encryption key with which to protect "
"packets across the tunnel. python-crypto must be installed "
"on the system." ,
default=None, type="str")
parser.add_option("-p", "--local-port-file", dest="local_port_file",
help = "File where to store the local binded UDP port number ",
default = "local_port_file", type="str")
parser.add_option("-P", "--remote-port-file", dest="remote_port_file",
help = "File where to read the remote UDP port number to connect to",
default = "remote_port_file", type="str")
parser.add_option("-o", "--local-ip", dest="local_ip",
help = "Local host IP", type="str")
parser.add_option("-O", "--remote-ip", dest="remote_ip",
help = "Remote host IP", type="str")
parser.add_option("-R", "--ret-file", dest="ret_file",
help = "File where to store return code (success of connection) ",
default = "ret_file", type="str")
(options, args) = parser.parse_args()
address = base64.b64decode(options.address)
return (address, options.local_port_file, options.remote_port_file,
options.local_ip, options.remote_ip, options.ret_file,
options.bwlimit, options.cipher, options.cipher_key,
options.txqueuelen)
if __name__ == '__main__':
(address, local_port_file, remote_port_file, local_ip, remote_ip,
ret_file, bwlimit, cipher, cipher_key, txqueuelen) = get_options()
# Create a local socket to stablish the tunnel connection
rsock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM, 0)
rsock.bind((local_ip, 0))
(local_host, local_port) = rsock.getsockname()
# Save local port information to file
f = open(local_port_file, 'w')
f.write("%d\n" % local_port)
f.close()
# Wait until remote port information is available
while not os.path.exists(remote_port_file):
time.sleep(2)
remote_port = ''
# Read remote port from file
# Try until something is read...
# xxx: There seems to be a weird behavior where
# even if the file exists and had the port number,
# the read operation returns empty string!
# Maybe a race condition?
for i in xrange(10):
f = open(remote_port_file, 'r')
remote_port = f.read()
f.close()
if remote_port:
break
time.sleep(2)
remote_port = remote_port.strip()
remote_port = int(remote_port)
# Connect local socket to remote port
rsock.connect((remote_ip, remote_port))
remote = os.fdopen(rsock.fileno(), 'r+b', 0)
# create local socket to pass to fd-net-device
lsock = socket.socket(socket.AF_UNIX, socket.SOCK_STREAM)
lsock.bind("")
lsock.getsockname()
local = os.fdopen(lsock.fileno(), 'r+b', 0)
# pass local socket to fd-net-device
sock = socket.socket(socket.AF_UNIX, socket.SOCK_DGRAM)
sock.connect(address)
passfd.sendfd(sock, local, '0')
# TODO: Test connectivity!
# Create a ret_file to indicate success
f = open(ret_file, 'w')
f.write("0")
f.close()
STARTED = True
# Establish tunnel
tunchannel.tun_fwd(local, remote,
with_pi = False, # No PI headers
ether_mode = IFF_TAP, # Ns-3 generates ethernet pkts
udp = True,
cipher_key = cipher_key,
cipher = cipher,
TERMINATE = TERMINATE,
SUSPEND = SUSPEND,
tunqueue = txqueuelen,
tunkqueue = 500,
bwlimit = bwlimit
)